Edward Snowden, in June 2013 shocked the world with his revelations in the field of information security on digital media. The revelations related to different field such as defense and commercial purposes have been popping in continuously since then with each one being more important and bigger than its predecessor.
This incident made the world to draw some assumptions such as the whole world is under a spotlight being spied regularly. No matter whether the data is on the internet or the smart phones, the chances are that everything is being viewed illegally by various National Intelligence Agencies and not just NSA. Another observation was regarding the British and American hardware that are mostly compromised via a backdoor which may or may not be installed at the time of manufacturing itself. The process can also be done during the transportation of the gadget as well. This could be done by Five Eyes countries namely US, UK, Canada, New Zealand and Australia.
America has strict anti-terrorism laws that excludes other countries as outsiders. According to its laws it can spy any data of any other country without it being tagged as ‘illegal activity’. Russia, China and Iran have built up a robust series of Cyber programs with digital espionage taking the center stage. France and Israel were unveiled when its cyber espionage activities came into light.
If you find it hard to believe that your data is being compromised with, then you better check out the published electronic file of EFF. This will let you know who are the vendors that permit illegal access to commercial networks. There would be something called ‘persistent backdoor’ through which there can be an illegal entry.
Cloud computing is riskier when you need to store your data at a foreign territory. The laws working there would to be able to protect your data and will also make it more vulnerable to attack. You should design a strong, customized and domestic crypto-technology to protect the storage devices for encrypting data as well as the traffic on the network.
CEH | ECSA | OPST | OPSA
Sisir Kanta Panda
CISSP | ISO 27001 LA
CEH | ECSA
CEH | ECSA | EDRP | CEI
Security+ | CEH
K. P. Mishra
ISO 27001 LA | CISA
Digital Marketing Expert